BugTraq Mode:
(Page 1316 of 1748)  < Prev  1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321  Next >
PHP nuke XSS vulnerability 2005-06-24
fjlj wvi com
<strong>phP nuke exploit</strong>

<b>effects:</b>
all versions of php nuke

<b>solution:</b>
better filtering of offsite avatar selection.

in the avatar selection of the profile, u have the option of linking to an offsite image. this is the perfect place for an exploit.

by placing this line of

[ more ]  [ reply ]
SUSE Security Announcement: sudo (SUSE-SA:2005:036) 2005-06-24
Thomas Biege (thomas suse de)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SUSE Security Announcement

Package: sudo
Announcement ID: SUSE-SA:2005:036
Date: Fri, 24 Jun 2

[ more ]  [ reply ]
[ECHO_ADV_21$2005] MUltiple Vulnarable In ActiveBuyAndSell 2005-06-24
Dedi securityfocus com,Dwianto securityfocus com (the_day echo or id)
------------------------------------------------------------------------
---
[ECHO_ADV_21$2005] MUltiple Vulnarable In ActiveBuyAndSell
------------------------------------------------------------------------
---

Author: Dedi Dwianto
Date: June, 24th 2005
Location: Indonesia, Jakarta
Web: http://echo

[ more ]  [ reply ]
Solaris 10 /usr/sbin/traceroute vulnerabilities 2005-06-24
Przemyslaw Frasunek (venglin freebsd lublin pl) (1 replies)
/usr/sbin/traceroute from Solaris 10 is vulnerable to buffer overflow in
handling -g argument. After supplying 10 -g parameters, return address is
overwritten by IP address argument:

atari:root:/home/venglin# /usr/sbin/traceroute -g 1 -g 2 -g 3 -g 4 -g 5 -g 6 -g
7 -g 8 -g 9 -g 10 127.0.0.1
tracerou

[ more ]  [ reply ]
Re: Solaris 10 /usr/sbin/traceroute vulnerabilities 2005-06-24
David T. Moraski II (moraski2 Princeton EDU)
iDEFENSE Security Advisory 06.23.05: RealNetworks RealPlayer RealText Parsing Heap Overflow Vulnerability 2005-06-24
iDEFENSE Labs (labs-no-reply idefense com)
RealNetworks RealPlayer RealText Parsing Heap Overflow Vulnerability

iDEFENSE Security Advisory 06.23.05
www.idefense.com/application/poi/display?id=250&type=vulnerabilities
June 23, 2005

I. BACKGROUND

RealPlayer is an application for playing various media formats,
developed by RealNetworks Inc.

[ more ]  [ reply ]
iDEFENSE Security Advisory 06.23.05: Veritas Backup Exec Server Remote Registry Access Vulnerability 2005-06-23
iDEFENSE Labs (labs-no-reply idefense com)
Veritas Backup Exec Server Remote Registry Access Vulnerability

iDEFENSE Security Advisory 06.23.05
www.idefense.com/application/poi/display?id=269&type=vulnerabilities
June 23, 2005

I. BACKGROUND

VERITAS Backup Exec is an advanced backup and restore solution for
Microsoft Windows server environ

[ more ]  [ reply ]
Veritas Backup Exec Remote Agent NDMLSRVR.DLL DoS Vulnerability: Veritas Backup Exec Remote Agent NDMLSRVR.DLL DoS Vulnerability 2005-06-23
iDEFENSE Labs (labs-no-reply idefense com)
Veritas Backup Exec Remote Agent NDMLSRVR.DLL DoS Vulnerability

iDEFENSE Security Advisory 06.23.05
www.idefense.com/application/poi/display?id=270&type=vulnerabilities
June 23, 2005

I. BACKGROUND

VERITAS Backup Exec is an advanced backup and restore solution for
Microsoft Windows server environ

[ more ]  [ reply ]
Re: [Full-disclosure] Solaris 10 /usr/sbin/traceroute vulnerabilities 2005-06-24
Przemyslaw Frasunek (venglin freebsd lublin pl)
Przemyslaw Frasunek napisa³(a):
> Another vulnerability is heap corruption after malformed -s argument:

I've forgotten to provide an example:

atari:root:/home/venglin# traceroute -s 1.1.1.1. 127.0.0.1
traceroute: 4.0.0.0 is an invalid IPv4 source address
Segmentation fault (core dumped)

--
* Fid

[ more ]  [ reply ]
iDEFENSE Security Advisory 06.23.05: Veritas Backup Exec Agent Error Status Remote DoS Vulnerability 2005-06-23
iDEFENSE Labs (labs-no-reply idefense com)
Veritas Backup Exec Agent Error Status Remote DoS Vulnerability

iDEFENSE Security Advisory 06.23.05
www.idefense.com/application/poi/display?id=271&type=vulnerabilities
June 23, 2005

I. BACKGROUND

VERITAS Backup Exec is an advanced backup and restore solution for
Microsoft Windows server enviro

[ more ]  [ reply ]
iDEFENSE Security Advisory 06.23.05: Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability 2005-06-23
iDEFENSE Labs (labs-no-reply idefense com)
Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow
Vulnerability

iDEFENSE Security Advisory 06.23.05
www.idefense.com/application/poi/display?id=272&type=vulnerabilities
June 23, 2005

I. BACKGROUND

VERITAS Backup Exec is an advanced backup and restore solution for
Microsoft Windows se

[ more ]  [ reply ]
[OpenPKG-SA-2005.011] OpenPKG Security Advisory (shtool) 2005-06-23
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
eEye Advisory - EEYEB-200505 - RealPlayer AVI Processing Overflow 2005-06-23
Advisories eeye com
RealPlayer vidplin.dll AVI Processing Heap Overflow

Release Date:
June 23, 2005

Date Reported:
May 4, 2005

Patch Development Time (In Days): 36

Severity:
High (Code Execution)

Vendor:
RealNetworks

Systems Affected:
For Microsoft Windows

RealPlayer 10.5 (6.0.12.1040-1069)
RealPlayer 10
RealOne

[ more ]  [ reply ]
[OpenPKG-SA-2005.012] OpenPKG Security Advisory (sudo) 2005-06-23
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
long sendmail timeouts let attacker prevent milter quiesce 2005-06-23
Damian Menscher (menscher uiuc edu)
Summary:
An attacker that can predict when a milter will need to quiesce input
to allow for a reload may hold open an SMTP session for several hours.
This will lead to a DoS condition on the mailserver.

Background:
Sendmail is a popular Mail Transfer Agent (MTA), used in many large
sites that requi

[ more ]  [ reply ]
Windows SMB Client Transaction Response Handling PoC 2005-06-23
cybertronic gmx net
Here you can find a PoC for MS05-011:

works against Win2k and is based on a captured session on my lokal network

http://www.livejournal.com/users/cybertronic/

-cybertronic

[ more ]  [ reply ]
Vulnerability Statements 2005-06-23
Mark Litchfield (mark ngssoftware com)
Hi All,

Wanted to quickly apologise for being not quite on top of things in terms of
releasing my vulnerability statements over the last 4 weeks.

In case you have not upgraded your iTunes, would recommend doing so -
http://docs.info.apple.com/article.html?artnum=301596 (File format over
flow)

[ more ]  [ reply ]
Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC) 2005-06-23
NGSSoftware Insight Security Research (mark ngssoftware com)
Mark Litchfield of NGSSoftware has discovered a high risk vulnerability in
the
in VERITAS Software Backup Exec Web Administration Console (BEWAC) which can
allow
for remote code execution.

Affected Products include -
Backup Exec 10.0 for Windows Servers rev. 5484
Backup Exec 9.1 for Windows Serve

[ more ]  [ reply ]
Remote Command Execution Exploit for Cacti <= 0.8.6d 2005-06-22
Alberto Trivero (trivero jumpy it)
#!/usr/bin/perl
#
# Remote Command Execution Exploit for Cacti <= 0.8.6d
#
# This exploit open a remote shell on the targets that uses Cacti
# TARGET HOST MUST BE A GNU/LINUX SERVER, if not:
# manual exploiting -->
http://www.example.com/cacti/graph_image.php?local_graph_id=[valid_value
]&gr
aph_star

[ more ]  [ reply ]
New release of the Auditor Security Collection available at http://www.remote-exploit.org 2005-06-22
Max Moser (max moser gmail com)
I am proud to announce the release of the new version of the Auditor
Security Collection CD-ROM. We put in a lot of effort to bring it into
that final look and feel. It seems to be the best version released
ever. Not only because of its completeness, no it seems to be the most
stable and bugfree ver

[ more ]  [ reply ]
Weaknesses in WLAN Session Containment 2005-06-23
Joshua Wright (jwright hasborg com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

While evaluating several overlan WLAN IDS products for a Network
Computing product review, I had the opportunity to examine different
vendor's implementations of WLAN session containment. WLAN session
containment is very similar to persistent session s

[ more ]  [ reply ]
[ECHO_ADV_20$2005] Full path disclosure JAF CMS 2005-06-23
the_day echo or id
------------------------------------------------------------------------
---
[ECHO_ADV_20$2005] Full path disclosure JAF CMS
------------------------------------------------------------------------
---

Author: Dedi Dwianto
Date: June, 23th 2005
Location: Indonesia, Jakarta
Web: http://echo.or.id/adv/

[ more ]  [ reply ]
[ GLSA 200506-18 ] Tor: Information disclosure 2005-06-21
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200506-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200506-22 ] sudo: Arbitrary command execution 2005-06-23
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200506-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Local Root exploit (Fedora Core 4) 2005-06-23
Florian Strankowski (fs) (florian s bildunxxluecke de) (1 replies)
Local Root Exploit under Fedora Core 4 (stable) Advisory

Florian Strankowski
florian.s (at) bildunxxluecke (dot) de [email concealed]
www.bildunxxluecke.de/usr/florian/advisory/advisory-05-048.txt

Vulnerable System :

This vulnerability affects Fedora Core 4.0 (stable) with
the kernelversion 2.6.11-1.1369_FC4 #1 Thu Jun 2 22:

[ more ]  [ reply ]
Re: Local Root exploit (Fedora Core 4) 2005-06-23
Joshua Bressers (bressers redhat com)
iDEFENSE Security Advisory 06.22.05: IpSwitch WhatsUp Professional 2005 (SP1) SQL Injection Vulnerability 2005-06-22
iDEFENSE Labs (labs-no-reply idefense com)
IpSwitch WhatsUp Professional 2005 (SP1) SQL Injection Vulnerability

iDEFENSE Security Advisory 06.22.05
www.idefense.com/application/poi/display?id=268&type=vulnerabilities
June 22, 2005

I. BACKGROUND

WhatsUp Professional 2005 SP1 is a network management solution for small
and mid sized organiza

[ more ]  [ reply ]
[ GLSA 200506-21 ] Trac: File upload vulnerability 2005-06-22
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200506-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
(Page 1316 of 1748)  < Prev  1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus